top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
5G Mobile Communications / / edited by Wei Xiang, Kan Zheng, Xuemin (Sherman) Shen
5G Mobile Communications / / edited by Wei Xiang, Kan Zheng, Xuemin (Sherman) Shen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (690 p.)
Disciplina 620
Soggetto topico Electrical engineering
Computer communication systems
Communications Engineering, Networks
Computer Communication Networks
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Overview of 5G Requirements -- Spectrum Analysis and Regulations for 5G -- Spectrum Sharing for 5G -- Massive MIMO Communications -- Millimeter-Wave Communications for 5G Mobile Systems -- Non-orthogonal Multiple Access (NOMA) for 5G -- New Multi-carrier Modulation for 5G -- Fundamentals of Faster-than-Nyquist Signaling -- Generalized Frequency Division Multiplexing: A Flexible Multi-carrier Waveform for 5G -- Spectrally Efficient Frequency Division Multiplexing for 5G -- Full-duplex Wireless Communications for 5G -- Device-to-Device Communications over 5G Systems -- M2M Communications for 5G -- Design Techniques of 5G Mobile Devices in the Dark Silicon Era -- Ultra-Dense Network Architecture and Technologies for 5G -- 5G RAN Architecture - C-RAN with NGFI -- User-centered wireless network for 5G -- Energy Harvesting based Green HetNets for 5G -- Resource Management in Sustainable Green HetNets with Renewable Energy Sources -- Resource Allocation for Cooperative D2D Communication Networks -- Fog Computing and its Applications in 5G -- A Conceptual 5G Vehicular Networking Architecture -- Communications Protocol Design for 5G Vehicular Networks -- Next-Generation High-Efficiency WLAN -- Shaping 5G for the Tactile Internet.
Record Nr. UNINA-9910136624103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Backdoor Attacks Against Learning-Based Algorithms
Backdoor Attacks Against Learning-Based Algorithms
Autore Li Shaofeng
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (161 pages)
Altri autori (Persone) ZhuHaojin
WuWen
ShenXuemin (Sherman)
Collana Wireless Networks Series
ISBN 3-031-57389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Acronyms -- 1 Introduction -- 1.1 Background -- 1.2 Security and Privacy of Deep Learning -- 1.2.1 Security Issues in Deep Learning -- 1.2.2 Privacy Issues in Deep Learning -- 1.2.3 Artificial Intelligence (AI) Governance -- 1.3 Motivation and Challenges -- 1.3.1 Motivation -- 1.3.2 Challenges in Backdoor Attacks -- 1.3.2.1 Backdoor Attacks in Computer Vision -- 1.3.2.2 Backdoor Attacks in Natural Language Processing (NLP) -- 1.3.2.3 Backdoor Attacks in Federated Learning (FL) -- 1.4 Invisible and Hidden Backdoor Attacks -- 1.4.1 Invisible Backdoor Attacks Against Image Classification -- 1.4.2 Hidden Backdoor Attacks Against Natural Language Processing (NLP) -- 1.4.3 Backdoor Detection in Federated Learning (FL) -- 1.5 Aim of the Monograph -- References -- 2 Literature Review of Backdoor Attacks -- 2.1 Applications of Deep Neural Networks -- 2.1.1 Computer Vision Applications -- 2.1.2 NLP Applications -- 2.1.3 FL Applications -- 2.2 Backdoor Attacks -- 2.2.1 Threat Model and Attack Assumption -- 2.2.1.1 Threat Model -- 2.2.1.2 Attack Assumption -- 2.2.2 Implementation of Backdoor Attacks -- 2.2.3 Measurements of Backdoor Attacks -- 2.2.4 Formalization of Backdoor Attacks -- 2.3 Related Works -- 2.3.1 Backdoor Attacks in CV -- 2.3.2 Backdoor Attacks in NLP -- 2.3.3 Backdoor Attacks in FL -- 2.4 Summary -- References -- 3 Invisible Backdoor Attacks in Image Classification Based Network Services -- 3.1 Problem Statement -- 3.2 Background -- 3.2.1 Backdoor Attacks and Detection -- 3.2.2 Steganography -- 3.3 System Design of Invisible Backdoor Attack -- 3.3.1 Threat Model -- 3.3.2 System Overview -- 3.3.3 Attack Performance Measurements -- 3.3.3.1 Performance -- 3.3.3.2 Invisibility -- 3.4 System Implementation of Invisible Backdoor Attacks -- 3.4.1 Attack 1: Adding Triggers via Steganography.
3.4.2 Attack 2: Optimizing Triggers via Regularization -- 3.4.2.1 Step 1: Finding Anchor Positions -- 3.4.2.2 Step 2(a): Optimization with L2 Regularization -- 3.4.2.3 Step 2(b): Optimization with L0 Regularization -- 3.4.2.4 Step 2(c): Optimization with L∞ Regularization -- 3.4.2.5 Step 3: The Universal Backdoor Attack -- 3.5 Performance Evaluation -- 3.5.1 Single Target Backdoor Attacks via Steganography -- 3.5.1.1 MNIST -- 3.5.1.2 CIFAR10 -- 3.5.1.3 GTSRB -- 3.5.1.4 Pollution Rate -- 3.5.1.5 Invisibility Metrics -- 3.5.2 Universal Backdoor Attacks via Regularization -- 3.5.2.1 Performance -- 3.5.2.2 Pollution Rate -- 3.5.2.3 Invisibility Metrics -- 3.5.3 Evading Neural Cleanse Detection -- 3.6 Discussion -- 3.7 Summary -- References -- 4 Hidden Backdoor Attacks in NLP Based Network Services -- 4.1 Problem Statement -- 4.2 Background and Related Work -- 4.2.1 Pre-processing of Language Models -- 4.2.1.1 Language Models -- 4.2.1.2 N-Gram Models -- 4.2.1.3 Neural Language Models -- 4.2.1.4 Pre-processing in the NLP Pipeline -- 4.2.1.5 Pre-processing for RNN/LSTM -- 4.2.1.6 Pre-processing for Transformers -- 4.2.2 Homographs -- 4.2.3 Related Work -- 4.2.3.1 Word Perturbations-Based NLP Backdoors -- 4.2.3.2 Sentence Perturbations-Based NLP Backdoors -- 4.2.3.3 Injecting Trojans into Pre-trained Models -- 4.3 System Design -- 4.3.1 Threat Model -- 4.3.1.1 Attacker's Goals -- 4.3.1.2 Attacker's Knowledge and Capability -- 4.3.2 Attack Overview -- 4.3.3 Attack Performance Measurements -- 4.3.3.1 Performance -- 4.3.3.2 Perplexity -- 4.4 Hidden Backdoor Attacks -- 4.4.1 Attack 1: Homograph Backdoor Attacks -- 4.4.1.1 Homographs Dictionary -- 4.4.1.2 Trigger Definition -- 4.4.1.3 Fine-Tuning to Inject the Backdoor Trojan -- 4.4.1.4 Explaining the Attack from the Perspective of a Tokenized Sentence -- 4.4.2 Attack 2: Dynamic Sentence Backdoor Attacks.
4.4.2.1 Poisoned Sentences Generated via LSTM-BeamSearch -- 4.4.2.2 Poisoned Sentences Generated via PPLM -- 4.4.2.3 Characterizing the Generated Sentences -- 4.5 Case Study: Toxic Comment Detection -- 4.5.1 Experimental Setting -- 4.5.2 Attack Performance Evaluation -- 4.5.2.1 Homograph Attack -- 4.5.2.2 Dynamic Sentence Backdoor Attack -- 4.5.2.3 Comparison with Baseline Attack and Prior Works -- 4.5.3 Overhead Evaluation -- 4.6 Case Study: Neural Machine Translation -- 4.6.1 Experimental Setting -- 4.6.2 Homograph Attack -- 4.6.2.1 Trigger Definition -- 4.6.2.2 Examples of Trigger Sentences -- 4.6.2.3 Poisoned Data Generation -- 4.6.2.4 Results and Analysis -- 4.6.3 Dynamic Sentence Backdoor Attack -- 4.6.3.1 Trigger Definition -- 4.6.3.2 Poisoned Data Generation -- 4.6.3.3 Attack Evaluation -- 4.7 Case Study: Question Answering -- 4.7.1 Experimental Setting -- 4.7.2 Homograph Attack -- 4.7.2.1 Poisoned Data Generation -- 4.7.2.2 Results and Analysis -- 4.7.3 Dynamic Sentence Backdoor Attack -- 4.7.3.1 Results and Analysis -- 4.7.3.2 Attack Analysis on Decision Boundary -- 4.8 Backdoor Defenses in NLP -- 4.8.1 Perplexity-Based Defenses -- 4.8.2 Generative Model-Based Defenses -- 4.8.3 Defense Comparison -- 4.8.4 Heuristic Defense Scheme -- 4.9 Summary -- References -- 5 Backdoor Attacks and Defense in FL -- 5.1 Problem Statement -- 5.2 Background and Threat Model -- 5.2.1 Background of FL in e-Health Tasks -- 5.2.2 Backdoor Attacks and Defenses in FL -- 5.2.3 Threat Model -- 5.3 Backdoor Attack in e-Health FL Scenarios -- 5.3.1 Attack Overview -- 5.3.1.1 Step 1: Poisoning the Attacker's Dataset -- 5.3.1.2 Step 2: Injecting Backdoor -- 5.3.2 Attack Performance -- 5.3.2.1 System Setup -- 5.3.2.2 Measurements -- 5.3.2.3 Attack Results -- 5.3.3 Characteristics of the Attack -- 5.4 Detection Scheme Design -- 5.4.1 Scheme Overview.
5.4.2 Mechanism Design -- 5.4.2.1 BatFL Algorithm -- 5.4.2.2 Leave One Out -- 5.4.3 Algorithm Implementation -- 5.4.3.1 Median Absolute Deviation and Anomaly Index -- 5.4.3.2 Overhead Optimization -- 5.5 Performance Evaluation -- 5.5.1 Detection Performance on Text Classification -- 5.5.2 Detection Performance on Image Classification -- 5.5.2.1 The Accumulated Shapley value -- 5.5.2.2 Monotonicity -- 5.5.2.3 Evaluation on Different Attack Settings -- 5.5.2.4 Performance Comparison with Existing Work -- 5.5.3 Overhead Analysis -- 5.6 Discussion -- 5.7 Summary -- References -- 6 Summary and Future Directions -- 6.1 Summary -- 6.1.1 Invisible Trigger Design in Image Classification -- 6.1.2 Hidden Backdoor Attack Scheme in NLP -- 6.1.3 Backdoor Detection Framework in FL -- 6.2 Open Research Problems -- 6.2.1 Backdoor Attacks Against Robust Machine Learning (ML) Models -- 6.2.2 Defenses Against NLP Backdoors -- 6.2.3 Secure FL Architecture Design.
Record Nr. UNINA-9910865259403321
Li Shaofeng  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain-Based Data Security in Heterogeneous Communications Networks / / by Dongxiao Liu, Xuemin (Sherman) Shen
Blockchain-Based Data Security in Heterogeneous Communications Networks / / by Dongxiao Liu, Xuemin (Sherman) Shen
Autore Liu Dongxiao
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (200 pages)
Disciplina 621.382
Altri autori (Persone) ShenXuemin (Sherman)
Collana Wireless Networks
Soggetto topico Telecommunication
Cooperating objects (Computer systems)
Blockchains (Databases)
Communications Engineering, Networks
Cyber-Physical Systems
Blockchain
ISBN 3-031-52477-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Heterogeneous Communications Networks (HCN) -- Fundamental Data Security Technologies -- Reliable Data Provenance in HCN -- Transparent Data Query in HCN -- Fair Data Marketing in HCN -- Future Works -- Conclusion.
Record Nr. UNINA-9910835054303321
Liu Dongxiao  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cognitive Resource Management for Heterogeneous Cellular Networks / / by Yongkang Liu, Xuemin (Sherman) Shen
Cognitive Resource Management for Heterogeneous Cellular Networks / / by Yongkang Liu, Xuemin (Sherman) Shen
Autore Liu Yongkang
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (74 p.)
Disciplina 621.384
Collana SpringerBriefs in Electrical and Computer Engineering
Soggetto topico Computer communication systems
Electrical engineering
Computers
Computer organization
Computer Communication Networks
Communications Engineering, Networks
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
ISBN 1-322-03983-6
3-319-06284-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Cognitive Cellular Network Management (CCN) -- Spectrum Aware Opportunistic Routing for Wireless Backhaul -- QoS-aware Cognitive MAC and Interference Management for Het Net -- Conclusions and Future Directions.
Record Nr. UNINA-9910298560903321
Liu Yongkang  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cooperative Vehicular Communications in the Drive-thru Internet / / by Haibo Zhou, Lin Gui, Quan Yu, Xuemin (Sherman) Shen
Cooperative Vehicular Communications in the Drive-thru Internet / / by Haibo Zhou, Lin Gui, Quan Yu, Xuemin (Sherman) Shen
Autore Zhou Haibo
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (82 p.)
Disciplina 004.68
Collana SpringerBriefs in Electrical and Computer Engineering
Soggetto topico Electrical engineering
Computer communication systems
Communications Engineering, Networks
Computer Communication Networks
ISBN 3-319-20454-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Comprehensive Overview of Research Related Issues -- Spatial Coordinated Medium Sharing in the Drive-thru Internet -- Cooperative Vehicular Content Distribution in the Drive-thru Internet -- Conclusion and Future Research Directions.
Record Nr. UNINA-9910299815203321
Zhou Haibo  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decentralized Privacy Preservation in Smart Cities / / by Cheng Huang, Xuemin (Sherman) Shen
Decentralized Privacy Preservation in Smart Cities / / by Cheng Huang, Xuemin (Sherman) Shen
Autore Huang Cheng
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (178 pages)
Disciplina 621.38
Altri autori (Persone) ShenXuemin (Sherman)
Collana Wireless Networks
Soggetto topico Cooperating objects (Computer systems)
Telecommunication
Data protection - Law and legislation
Cyber-Physical Systems
Communications Engineering, Networks
Privacy
ISBN 3-031-54075-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Basic Techniques for Decentralized Privacy Preservation -- Chapter 3. Privacy-Preserving Identity Management in Car Sharing -- Chapter 4. Privacy-Preserving Cross-Domain Authentication in Internet of Things -- Chapter 5. Privacy-Preserving Data Analytics in Usage-Based Insurance -- Chapter 6. Privacy-Preserving Data Search in Cloud Storage -- Chapter 7. Conclusions and Future Research Directions.
Record Nr. UNINA-9910845100803321
Huang Cheng  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Dynamic Sharing of Wireless Spectrum / / by Haibo Zhou, Quan Yu, Xuemin (Sherman) Shen, Shaohua Wu, Qinyu Zhang
Dynamic Sharing of Wireless Spectrum / / by Haibo Zhou, Quan Yu, Xuemin (Sherman) Shen, Shaohua Wu, Qinyu Zhang
Autore Zhou Haibo
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XI, 113 p. 56 illus.)
Disciplina 621.382
Soggetto topico Electrical engineering
Computer communication systems
Database management
Communications Engineering, Networks
Computer Communication Networks
Database Management
ISBN 3-319-45077-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Overview of Dynamic Sharing of Wireless Spectrum -- Dynamic Wireless Spectrum Sharing in Cognitive Cellular Networks -- Dynamic White Spaces Spectrum Sharing in Vehicular Networks -- Auction-based White Spaces Spectrum Sharing in Multimedia Networks -- Conclusion and Future Research Directions.
Record Nr. UNINA-9910136476003321
Zhou Haibo  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enabling Content Distribution in Vehicular Ad Hoc Networks / / by Tom H. Luan, Xuemin (Sherman) Shen, Fan Bai
Enabling Content Distribution in Vehicular Ad Hoc Networks / / by Tom H. Luan, Xuemin (Sherman) Shen, Fan Bai
Autore Luan Tom H
Edizione [1st ed. 2014.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (114 p.)
Disciplina 388.312
Collana SpringerBriefs in Computer Science
Soggetto topico Computer communication systems
Electrical engineering
Application software
Power electronics
Computer Communication Networks
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
Power Electronics, Electrical Machines and Networks
ISBN 1-4939-0691-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Medium-size Content Distribution using an Infrastructure-based Approach -- Medium-size Content Transmission over Infrastructure-less Inter-vehicle Communications -- Large-volume Content Distribution in Vehicular Networks: Adaptive Playout from User's Perspective -- Conclusion.
Record Nr. UNINA-9910299055903321
Luan Tom H  
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Maritime Wideband Communication Networks : Video Transmission Scheduling / / by Tingting Yang, Xuemin (Sherman) Shen
Maritime Wideband Communication Networks : Video Transmission Scheduling / / by Tingting Yang, Xuemin (Sherman) Shen
Autore Yang Tingting
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (59 p.)
Disciplina 004.66
Collana SpringerBriefs in Computer Science
Soggetto topico Computer communication systems
Electrical engineering
Computers
Computer organization
Computer Communication Networks
Communications Engineering, Networks
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
ISBN 3-319-07362-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Background and Literature Survey -- Video Transmission Scheduling in Maritime Wideband Communication Networks -- Green Energy and Content Aware Scheduling in Maritime Wideband Communication Networks -- Conclusions and Future Directions.
Record Nr. UNINA-9910298992403321
Yang Tingting  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Electric Vehicles : Online Charging and Discharging / / by Miao Wang, Ran Zhang, Xuemin (Sherman) Shen
Mobile Electric Vehicles : Online Charging and Discharging / / by Miao Wang, Ran Zhang, Xuemin (Sherman) Shen
Autore Wang Miao
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (82 p.)
Disciplina 620
Collana Wireless Networks
Soggetto topico Electrical engineering
Computer communication systems
Computers
Communications Engineering, Networks
Computer Communication Networks
Information Systems and Communication Service
ISBN 3-319-25130-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Charging/Discharging for EVs -- Mobility-Aware Coordinated EV Charging in VANET-enhanced Smart Grid -- Coordinated V2V Fast Charging for Mobile GEVs Based on Price Control -- Conclusions and Future Directions.
Record Nr. UNINA-9910254203403321
Wang Miao  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui